pwndbg_probeleak
Scans memory addresses for pointer-like values that may indicate exploitable information leaks in stack, heap, libc, or binary regions.
Instructions
Pointer-scan memory for possible information leaks.
pwndbg command: probeleak Source: pwndbg/commands/probeleak.py Category: Memory
Scans memory at the given address for values that look like pointers into known regions (stack, heap, libc, binary, etc.), which could indicate exploitable information leaks.
Args: session_id: The UUID of the session. address: Address to start scanning (default: $sp). count: Number of bytes to scan (default: 0x40). max_distance: Maximum distance for pointer matching (0 = unlimited).
See: https://pwndbg.re/2025.05.30/reference/pwndbg/commands/probeleak/
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| session_id | Yes | ||
| address | No | ||
| count | No | ||
| max_distance | No |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |